Sciweavers

1661 search results - page 106 / 333
» Distributed Top-K Monitoring
Sort
View
IEEEIA
2009
15 years 23 hour ago
Information Leakage Detection in Distributed Systems using Software Agent
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...
WSC
2004
15 years 3 months ago
Modeling Tool Failures in Semiconductor Fab Simulation
In this research, we investigate how well Weibull, Gamma, and special bimodal distribution are suited as an alternative to the exponential distribution approach in the stochastic ...
Oliver Rose
113
Voted
IPPS
2006
IEEE
15 years 8 months ago
Preserving source location privacy in monitoring-based wireless sensor networks
While a wireless sensor network is deployed to monitor certain events and pinpoint their locations, the location information is intended only for legitimate users. However, an eav...
Yong Xi, Loren Schwiebert, Weisong Shi
134
Voted
ICSOC
2005
Springer
15 years 7 months ago
ASTRO: Supporting Composition and Execution of Web Services
Web services are rapidly emerging as the reference paradigm for the interaction and coordination of distributed business processes. In several research papers we have shown how ad...
Michele Trainotti, Marco Pistore, Gaetano Calabres...
CODASPY
2012
13 years 10 months ago
Identifying native applications with high assurance
Main stream operating system kernels lack a strong and reliable mechanism for identifying the running processes and binding them to the corresponding executable applications. In t...
Hussain M. J. Almohri, Danfeng (Daphne) Yao, Denni...